Contact us today!

FRS Pros Blog

Getting to Know Technology: Breadcrumbs

Getting to Know Technology: Breadcrumbs

In the fairy tale of Hansel and Gretel, the titular characters decided to leave a trail of breadcrumbs behind them, so they could find their way back home. While this strategy didn’t work out very well for the siblings, the same concept is used in computing today. We even refer to it as breadcrumb navigation in honor of the German fairy tale.

What is Breadcrumb Navigation?
Breadcrumb navigation is more or less what the fairy tale would suggest it is: a path that leads back home (or in this case, the homepage). It is effectively an easier way to keep track of the path to and from a certain page (or area of an application) and is often displayed at the top of the viewed page. Each step provides a link that navigates back to the page in question.

So, let’s say that you were looking at a service page on some website. If the path to that page led from the homepage, to the second menu on the homepage, to the fifth menu item in that menu, the breadcrumbs would look something like this:

Home > [Menu 2] > [Menu Item 5]

Because these breadcrumbs serve as links, clicking on the [Menu 2] breadcrumb would bring you to that menu’s page, allowing you to continue browsing from there.

More Than Just Websites
You may also recognize this style of navigation from the toolbars of the folders and files saved to your system. This just makes it easier to find certain files again later and can be shared with another user if they need to know where a file is located.

Again, breadcrumbs are specifically meant to make navigation and organization easier for the user. Can you think of any other features that do the same? Leave your thoughts in the comments!

How Much Time Do You Spend Managing Vendors?
Is It Safe to Have Your Browser Remember Your Pass...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, May 21 2019

Captcha Image

Mobile? Grab this Article!


Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Internet Network Security Business Computing Productivity Google User Tips Cloud Business Management Hackers Innovation Tech Term Microsoft Hardware Software Mobile Devices Efficiency Computer Browser Hosted Solutions Data Backup Malware Windows 10 Smartphones Cybersecurity Smartphone Data Recovery Data IT Services Office 365 Windows Internet of Things Android IT Support Outsourced IT Backup Email Apps Data Security Communication Cybercrime Upgrade Network Disaster Recovery Business Continuity Communications Workplace Tips VoIP Operating System Gadgets Money Business Phishing Alert Small Business Law Enforcement Ransomware Saving Money Mobile Device Management Vulnerability Users Server Chrome Collaboration Best Practice Microsoft Office Artificial Intelligence Automation Managed IT Services Passwords Miscellaneous Managed IT Services Information Social Media IT Support Cloud Computing Spam Virtualization Employer-Employee Relationship Applications Wireless Blockchain Telephone Systems Tech Support OneNote Two-factor Authentication Holiday Information Technology Managed Service Provider Managed IT Networking Word Windows 10 Unsupported Software Bring Your Own Device Save Money App Computers Facebook Health Router Google Drive Search Business Technology Avoiding Downtime Mobility Touchscreen Data Storage Travel File Sharing Application WiFi Excel Productivity Fraud Encryption Mobile Device Sports Safety Audit Telephony Evernote Data Protection User Error Meetings Password Government Risk Management Cortana Access Control Robot Managed Service IT Management Hacking Printing Cost Management The Internet of Things Mobile Security Augmented Reality Conferencing Gmail Wi-Fi Update WannaCry Commerce VPN iPhone Google Docs Project Management Google Assistant Shortcut Patch Management Wireless Charging Politics Devices Hybrid Cloud BDR Budget Proactive IT SaaS Data Breach Wireless Technology Quick Tips Data Management Hosted Solution Streaming Media Specifications Lithium-ion battery Virus Gamification Keyboard Shortcuts Microsoft Word iOS WIndows Server 2008 Laptop Accessory PC Transportation Software as a Service 5G Legal HBO Apple Access Hard Drive Display Private Cloud Virtual Assistant E-Commerce Antivirus Windows 10s Tablets Maintenance Chromecast Testing Computer Care Nanotechnology Sales Proactive Memory Human Resources Screen Mirroring Storage Social Engineering Touchpad Computer Forensics Peripheral Battery Paperless Office Unified Threat Management Sync Going Green Social Bandwidth YouTube Solid State Drive Edge Internet Exlporer Chromebook Co-Managed Services Hacker FAQ Alexa for Business Payment Cards NFL eWaste Camera Emergency Root Cause Analysis Retail Websites Financial Payroll Emails Cast Computer Fan Identities Uninterrupted Power Supply Humor Management Point of Sale Upgrades Employees Hard Disk Drive Data Loss Ciminal Telephone Charger Employee Entertainment Device Security Projects Data Theft Personal Information Security Cameras Identity Theft Marketing BYOD Vendor OneDrive Legislation Language PowerPoint Admin Office Adobe Workers IT Solutions DDoS Hyperlink Files Reputation Break/Fix Windows Ink Recovery Data storage Identity Gifts Computing Disaster History Machine Learning Vendor Management Webinar Employee-Employer Relationship Voice over Internet Protocol Comparison Wireless Internet Saving Time Scam Consultant Licensing Updates Remote Computing Microsoft Excel IT budget Value Wasting Time Education Sabotage Remote Monitoring Outlook Medical IT Google Maps Spyware Administrator Data Privacy Settings Windows 7 Credit Cards App store Amazon Downtime Samsung IT solutions Current Events Electronic Medical Records Company Culture Crowdsourcing Employer Employee Relationship Thank You Twitter Office tips Benefits es Phone System Advertising Save Time Computer Accessories Music Congratulations Smart Technology Flexibility Instant Messaging End of Support HaaS Scalability Analytics Relocation Keyboard Black Market Cleaning Big Data Automobile PDF Managing Stress Cache Compliance Printers USB Worker Mobile Computing How To Books Training Monitors Text Messaging Hiring/Firing Regulation Video Games Experience Virtual Reality Television CrashOverride Work/Life Balance